SKIP TO CONTENT

cyber security

Article from the Economist
93 words 46 learners

Learn words with Flashcards and other activities

Full list of words from this list:

  1. peculiar
    beyond or deviating from the usual or expected
    LIKE blooms on a peculiar plant, speeches by the head of the British security service are rare; and when they do appear, they draw attention.
  2. security
    the state of being free from danger or injury
    LIKE blooms on a peculiar plant, speeches by the head of the British security service are rare; and when they do appear, they draw attention.
  3. service
    an act of help or assistance
    LIKE blooms on a peculiar plant, speeches by the head of the British security service are rare; and when they do appear, they draw attention.
  4. attention
    the act of concentrating on something
    LIKE blooms on a peculiar plant, speeches by the head of the British security service are rare; and when they do appear, they draw attention.
  5. burst
    come open suddenly and violently
    On June 25th Jonathan Evans, the director-general of MI5, burst into oratorical flower for the first time in 21 months.
  6. comment
    a statement that expresses a personal opinion
    After commenting on preparations for the Olympic games and on counter-terrorism, Mr Evans turned to cyber-security—where the “front line…is as much in business as it is in government.”
  7. preparation
    setting in order in advance some act or purpose
    After commenting on preparations for the Olympic games and on counter-terrorism, Mr Evans turned to cyber-security—where the “front line…is as much in business as it is in government.”
  8. terrorism
    the use of violence against civilians for ideological goals
    After commenting on preparations for the Olympic games and on counter-terrorism, Mr Evans turned to cyber-security—where the “front line…is as much in business as it is in government.”
  9. criminal
    someone who has committed a punishable act
    States as well as criminals were up to no good, he said: in particular, a “major London listed company with which we have worked” had lost revenue of “some £800m” ($1.2 billion) to state-sponsored cyber-attack.
  10. particular
    unique or specific to a person or thing or category
    States as well as criminals were up to no good, he said: in particular, a “major London listed company with which we have worked” had lost revenue of “some £800m” ($1.2 billion) to state-sponsored cyber-attack.
  11. major
    greater in scope or effect
    States as well as criminals were up to no good, he said: in particular, a “major London listed company with which we have worked” had lost revenue of “some £800m” ($1.2 billion) to state-sponsored cyber-attack.
  12. revenue
    the entire amount of income before any deductions are made
    States as well as criminals were up to no good, he said: in particular, a “major London listed company with which we have worked” had lost revenue of “some £800m” ($1.2 billion) to state-sponsored cyber-attack.
  13. intellectual
    of or associated with or requiring the use of the mind
    The firm in question had lost intellectual property and had been put at a disadvantage in commercial negotiations.
  14. property
    something owned
    The firm in question had lost intellectual property and had been put at a disadvantage in commercial negotiations.
  15. commercial
    connected with or engaged in the exchange of goods
    The firm in question had lost intellectual property and had been put at a disadvantage in commercial negotiations.
  16. negotiation
    a discussion intended to produce an agreement
    The firm in question had lost intellectual property and had been put at a disadvantage in commercial negotiations.
  17. example
    an item of information that is typical of a class or group
    Examples and rumours abound of companies being burgled by cyberfrauds, cyberspooks or cyber-mischief-makers.
  18. abound
    exist in large quantities
    Examples and rumours abound of companies being burgled by cyberfrauds, cyberspooks or cyber-mischief-makers.
  19. mischief
    reckless or malicious behavior causing annoyance in others
    Examples and rumours abound of companies being burgled by cyberfrauds, cyberspooks or cyber-mischief-makers.
  20. federal
    of a government with central and regional authorities
    On June 26th America’s Federal Trade Commission sued Wyndham Worldwide, a hotel group, alleging that security failures at the company in 2008 and 2009 had led to the export of hundreds of thousands of guests’ payment-card account numbers to a domain registered in Russia.
  21. trade
    the commercial exchange of goods and services
    On June 26th America’s Federal Trade Commission sued Wyndham Worldwide, a hotel group, alleging that security failures at the company in 2008 and 2009 had led to the export of hundreds of thousands of guests’ payment-card account numbers to a domain registered in Russia.
  22. commission
    the act of granting authority to undertake certain functions
    On June 26th America’s Federal Trade Commission sued Wyndham Worldwide, a hotel group, alleging that security failures at the company in 2008 and 2009 had led to the export of hundreds of thousands of guests’ payment-card account numbers to a domain registered in Russia.
  23. sue
    institute legal proceedings against; file a suit against
    On June 26th America’s Federal Trade Commission sued Wyndham Worldwide, a hotel group, alleging that security failures at the company in 2008 and 2009 had led to the export of hundreds of thousands of guests’ payment-card account numbers to a domain registered in Russia.
  24. allege
    report or maintain
    On June 26th America’s Federal Trade Commission sued Wyndham Worldwide, a hotel group, alleging that security failures at the company in 2008 and 2009 had led to the export of hundreds of thousands of guests’ payment-card account numbers to a domain registered in Russia.
  25. failure
    an act that does not succeed
    On June 26th America’s Federal Trade Commission sued Wyndham Worldwide, a hotel group, alleging that security failures at the company in 2008 and 2009 had led to the export of hundreds of thousands of guests’ payment-card account numbers to a domain registered in Russia.
  26. export
    sell or transfer abroad
    On June 26th America’s Federal Trade Commission sued Wyndham Worldwide, a hotel group, alleging that security failures at the company in 2008 and 2009 had led to the export of hundreds of thousands of guests’ payment-card account numbers to a domain registered in Russia.
  27. register
    an official written record of names or events
    On June 26th America’s Federal Trade Commission sued Wyndham Worldwide, a hotel group, alleging that security failures at the company in 2008 and 2009 had led to the export of hundreds of thousands of guests’ payment-card account numbers to a domain registered in Russia.
  28. fraud
    intentional deception resulting in injury to another person
    The FTC says “millions of dollars” were lost to fraud.
  29. claim
    assert or affirm strongly
    Wyndham says it knows of no customers who lost money and that the FTC’s claims are “without merit”.
  30. merit
    the quality of being deserving
    Wyndham says it knows of no customers who lost money and that the FTC’s claims are “without merit”.
  31. section
    one of several parts or pieces that fit with others
    In this section
  32. split
    separate into parts or portions
    Murdoch does the splits
  33. relate
    give an account of
    Related topics
  34. topic
    the subject matter of a conversation or discussion
    Related topics
  35. computer
    a machine for performing calculations automatically
    Computer security
  36. consumer
    a person who uses goods or services
    Consumer protection
  37. industrial
    of or relating to commercial enterprise
    The loss of industrial secrets is perhaps even more worrying to companies than that of their customers’ credit-card data.
  38. data
    a collection of facts from which conclusions may be drawn
    The loss of industrial secrets is perhaps even more worrying to companies than that of their customers’ credit-card data.
  39. overdue
    not paid at the scheduled time
    Some think worry is overdue.
  40. technology
    the practical application of science to commerce or industry
    Mark Anderson, the chairman of INVNT/IP, a new organisation of technology companies, says: “We are encouraged by discovering the number of global technology CEOs who have come to understand this issue and its importance to their own company welfare, regardless of the incentives and protestations offered by China, Russia and other nations known to actively steal IP.”
  41. encourage
    inspire with confidence
    Mark Anderson, the chairman of INVNT/IP, a new organisation of technology companies, says: “We are encouraged by discovering the number of global technology CEOs who have come to understand this issue and its importance to their own company welfare, regardless of the incentives and protestations offered by China, Russia and other nations known to actively steal IP.”
  42. discover
    determine the existence, presence, or fact of
    Mark Anderson, the chairman of INVNT/IP, a new organisation of technology companies, says: “We are encouraged by discovering the number of global technology CEOs who have come to understand this issue and its importance to their own company welfare, regardless of the incentives and protestations offered by China, Russia and other nations known to actively steal IP.”
  43. global
    involving the entire earth
    Mark Anderson, the chairman of INVNT/IP, a new organisation of technology companies, says: “We are encouraged by discovering the number of global technology CEOs who have come to understand this issue and its importance to their own company welfare, regardless of the incentives and protestations offered by China, Russia and other nations known to actively steal IP.”
  44. issue
    some situation or event that is thought about
    Mark Anderson, the chairman of INVNT/IP, a new organisation of technology companies, says: “We are encouraged by discovering the number of global technology CEOs who have come to understand this issue and its importance to their own company welfare, regardless of the incentives and protestations offered by China, Russia and other nations known to actively steal IP.”
  45. welfare
    something that aids or promotes well-being
    Mark Anderson, the chairman of INVNT/IP, a new organisation of technology companies, says: “We are encouraged by discovering the number of global technology CEOs who have come to understand this issue and its importance to their own company welfare, regardless of the incentives and protestations offered by China, Russia and other nations known to actively steal IP.”
  46. regardless
    in spite of everything
    Mark Anderson, the chairman of INVNT/IP, a new organisation of technology companies, says: “We are encouraged by discovering the number of global technology CEOs who have come to understand this issue and its importance to their own company welfare, regardless of the incentives and protestations offered by China, Russia and other nations known to actively steal IP.”
  47. incentive
    a positive motivational influence
    Mark Anderson, the chairman of INVNT/IP, a new organisation of technology companies, says: “We are encouraged by discovering the number of global technology CEOs who have come to understand this issue and its importance to their own company welfare, regardless of the incentives and protestations offered by China, Russia and other nations known to actively steal IP.”
  48. estimate
    judge tentatively
    The FTC and Wyndham are poles apart on their estimates of the effect of the credit-card thefts.
  49. effect
    a phenomenon that is caused by some previous phenomenon
    The FTC and Wyndham are poles apart on their estimates of the effect of the credit-card thefts.
  50. theft
    the act of taking something from someone unlawfully
    The FTC and Wyndham are poles apart on their estimates of the effect of the credit-card thefts.
  51. constant
    uninterrupted in time and indefinitely long continuing
    Companies say they are under constant cyber-attack in ever more ingenious forms, but they are loth to say in public how often the raiders get through and how much damage they do—assuming that the breach is spotted.
  52. ingenious
    showing inventiveness and skill
    Companies say they are under constant cyber-attack in ever more ingenious forms, but they are loth to say in public how often the raiders get through and how much damage they do—assuming that the breach is spotted.
  53. damage
    the occurrence of a change for the worse
    Companies say they are under constant cyber-attack in ever more ingenious forms, but they are loth to say in public how often the raiders get through and how much damage they do—assuming that the breach is spotted.
  54. assume
    take to be the case or to be true
    Companies say they are under constant cyber-attack in ever more ingenious forms, but they are loth to say in public how often the raiders get through and how much damage they do—assuming that the breach is spotted.
  55. breach
    an opening, especially a gap in a dike or fortification
    Companies say they are under constant cyber-attack in ever more ingenious forms, but they are loth to say in public how often the raiders get through and how much damage they do—assuming that the breach is spotted.
  56. forthcoming
    easygoing and open when speaking or sharing information
    When they are speaking to the security services they may be more forthcoming, but will they be accurate?
  57. accurate
    characterized by perfect conformity to fact or truth
    When they are speaking to the security services they may be more forthcoming, but will they be accurate?
  58. report
    to give an account or representation of in words
    In a report by Britain’s Cabinet Office last year, Detica, the software arm of BAE Systems, a defence company, put the cost of cybercrime to the country at a staggering £27 billion, or 1.8% of GDP.
  59. software
    written programs operating on a computer system
    In a report by Britain’s Cabinet Office last year, Detica, the software arm of BAE Systems, a defence company, put the cost of cybercrime to the country at a staggering £27 billion, or 1.8% of GDP.
  60. staggering
    so surprisingly impressive as to stun or overwhelm
    In a report by Britain’s Cabinet Office last year, Detica, the software arm of BAE Systems, a defence company, put the cost of cybercrime to the country at a staggering £27 billion, or 1.8% of GDP.
  61. bore
    make a hole, especially with a pointed power or hand tool
    Businesses bore £21 billion, mostly because of the theft of secrets and industrial espionage.
  62. espionage
    the systematic use of spies to obtain secrets
    Businesses bore £21 billion, mostly because of the theft of secrets and industrial espionage.
  63. doubt
    the state of being unsure of something
    Lots of people doubted these numbers—including, it seems, the Ministry of Defence, which commissioned a study from a team led by Ross Anderson, a computer-security expert at Cambridge University.
  64. include
    have as a part; be made up out of
    Lots of people doubted these numbers—including, it seems, the Ministry of Defence, which commissioned a study from a team led by Ross Anderson, a computer-security expert at Cambridge University.
  65. ministry
    the work of a person authorized to conduct religious worship
    Lots of people doubted these numbers—including, it seems, the Ministry of Defence, which commissioned a study from a team led by Ross Anderson, a computer-security expert at Cambridge University.
  66. expert
    a person with special knowledge who performs skillfully
    Lots of people doubted these numbers—including, it seems, the Ministry of Defence, which commissioned a study from a team led by Ross Anderson, a computer-security expert at Cambridge University.
  67. publish
    prepare and issue for public distribution or sale
    The team’s report, published this month, shies away from adding up totals, preferring to assess the costs of different types of crime in turn, but comes up with much lower figures—partly because it discounts Detica’s numbers for intellectual-property theft and espionage entirely, saying they have “no obvious foundation”.
  68. prefer
    like better; value more highly
    The team’s report, published this month, shies away from adding up totals, preferring to assess the costs of different types of crime in turn, but comes up with much lower figures—partly because it discounts Detica’s numbers for intellectual-property theft and espionage entirely, saying they have “no obvious foundation”.
  69. assess
    estimate the nature, quality, ability or significance of
    The team’s report, published this month, shies away from adding up totals, preferring to assess the costs of different types of crime in turn, but comes up with much lower figures—partly because it discounts Detica’s numbers for intellectual-property theft and espionage entirely, saying they have “no obvious foundation”.
  70. figure
    alternate name for the body of a human being
    The team’s report, published this month, shies away from adding up totals, preferring to assess the costs of different types of crime in turn, but comes up with much lower figures—partly because it discounts Detica’s numbers for intellectual-property theft and espionage entirely, saying they have “no obvious foundation”.
  71. obvious
    easily perceived by the senses or grasped by the mind
    The team’s report, published this month, shies away from adding up totals, preferring to assess the costs of different types of crime in turn, but comes up with much lower figures—partly because it discounts Detica’s numbers for intellectual-property theft and espionage entirely, saying they have “no obvious foundation”.
  72. foundation
    the basis on which something is grounded
    The team’s report, published this month, shies away from adding up totals, preferring to assess the costs of different types of crime in turn, but comes up with much lower figures—partly because it discounts Detica’s numbers for intellectual-property theft and espionage entirely, saying they have “no obvious foundation”.
  73. conclude
    bring to a close
    Most of the cost of cybercrime, it concludes, is indirect, such as spending on antivirus software or other corporate defences.
  74. indirect
    not leading by a straight line or course to a destination
    Most of the cost of cybercrime, it concludes, is indirect, such as spending on antivirus software or other corporate defences.
  75. corporate
    of or belonging to a business firm
    Most of the cost of cybercrime, it concludes, is indirect, such as spending on antivirus software or other corporate defences.
  76. inevitable
    incapable of being avoided or prevented
    That may be inevitable.
  77. precisely
    in a sharply exact manner
    Cyber-attacks are happening more often and are becoming more precisely targeted.
  78. target
    a reference point to shoot at
    Cyber-attacks are happening more often and are becoming more precisely targeted.
  79. random
    lacking any definite plan or order or purpose
    Greg Day, the chief technology officer for security in the European business of Symantec, a computer-security firm, says that for years cybercrime was more or less “random”, as crooks looked for any holes they could find anywhere.
  80. observe
    watch attentively
    Symantec observed virtually no targeted attacks before Stuxnet, a worm that attacked industrial-control systems, appeared in 2010.
  81. virtually
    in essence or in effect but not in fact
    Symantec observed virtually no targeted attacks before Stuxnet, a worm that attacked industrial-control systems, appeared in 2010.
  82. control
    power to direct or determine
    Symantec observed virtually no targeted attacks before Stuxnet, a worm that attacked industrial-control systems, appeared in 2010.
  83. average
    an intermediate scale value regarded as normal or usual
    Last December it spotted an average of 154 a day.
  84. social
    living together or enjoying life in communities
    The bad guys are increasingly using social media to try to find a way in, either by gathering intelligence or by befriending employees who may be tricked into opening an e-mail with nasty code within.
  85. medium
    the surrounding environment
    The bad guys are increasingly using social media to try to find a way in, either by gathering intelligence or by befriending employees who may be tricked into opening an e-mail with nasty code within.
  86. gather
    assemble or get together
    The bad guys are increasingly using social media to try to find a way in, either by gathering intelligence or by befriending employees who may be tricked into opening an e-mail with nasty code within.
  87. intelligence
    the ability to comprehend
    The bad guys are increasingly using social media to try to find a way in, either by gathering intelligence or by befriending employees who may be tricked into opening an e-mail with nasty code within.
  88. befriend
    become friends with
    The bad guys are increasingly using social media to try to find a way in, either by gathering intelligence or by befriending employees who may be tricked into opening an e-mail with nasty code within.
  89. employee
    a worker who is hired to perform a job
    The bad guys are increasingly using social media to try to find a way in, either by gathering intelligence or by befriending employees who may be tricked into opening an e-mail with nasty code within.
  90. code
    a set of rules or principles or laws
    The bad guys are increasingly using social media to try to find a way in, either by gathering intelligence or by befriending employees who may be tricked into opening an e-mail with nasty code within.
  91. adage
    a condensed but memorable saying embodying an important fact
    People, a security-industry adage runs, are the weakest link.
  92. link
    connect, fasten, or put together two or more pieces
    People, a security-industry adage runs, are the weakest link.
  93. careful
    exercising caution or showing attention
    Training them to be careful may still be the best defence.
Created on Tue Jul 03 06:38:19 EDT 2012 (updated Tue Jul 03 06:39:19 EDT 2012)

Sign up now (it’s free!)

Whether you’re a teacher or a learner, Vocabulary.com can put you or your class on the path to systematic vocabulary improvement.